• Article
  • | |
  • Metrics
  • |
  • Reference [14]
  • |
  • Related [20]
  • |
  • Cited by [39]
  • | |
  • Comments
    Abstract:

    Trust is multi-faceted and the peer’s needs are different in different situations. A peer may need to consider its trust in a specific domain of another peer’s capability or in a combination of multiple domains. Current Peer-to-Peer trust model could not promise the trust computation of different domains. This paper presents a novel Peer-to-Peer multiple-grain trust model and gives a distributed implementation method, which considers the trust computation of different domains. Mathematical analyses and simulations show that, compared to the current trust model, the proposed model is more precise on trust computation of multiple domains and more robust on trust security problems.

    Reference
    [1]Zhang Q,Sun Y,Liu Z,Zhang X,Wen XZ.Design of a distributed P2P-based grid content management architecture.In:Ilow J,ed.Proc.of the 3rd Communication Networks and Services Research Conf.New York:IEEE Press,2005.339-344.
    [2]Adar E,Huberman BA.Free riding on Gnutella.Technical Report,CSL-00-3.Palo Alto:Xerox PARC,2000.
    [3]Dou W,Wang HM,Jia Y,Zou P.A recommendation-based peer-to-peer trust model.Journal of Software,2004,15(4):571-583 (in Chinese with English abstract).http://www.ios.org.cn/1000-9825/15/571.htm
    [4]Khambatti M,Dasgupta P,Ryu KD.A role-based trust model for Peer-to-Peer communities and dynamic coalitions.In:Cole JL,Wolthusen SD,eds.Proc.of the 2nd IEEE Int'l Information Assurance Workshop.New York:IEEE Press,2004.141-154.
    [5]Wang Y,Vassileva J.Bayesian network trust model in peer-to-peer networks.In:Moro G,ed.Proc.of the 2nd Int'l Workshop on Agents and Peer-to-Peer Computing.Berlin:Springer-Verlag,2004.23-34.
    [6]Kamvar SD,Schlosser MT.EigenRep:Reputation management in P2P networks.In:Lawrence S,ed.Proc.of the 12th Int'l World Wide Web Conf.Budapest:ACM Press,123-134.
    [7]Bonacich P,Lloyd P.Eigenvector-Like measures of centrality for asymmetric relations.Social Networks,2001,23(4):191-201.
    [8]Dou W.The research on trust-aware P2P topologies and constructing technologies [Ph.D.Thesis].Changsha:National University of Defense Technology,2003 (in Chinese with English abstract).
    [9]Ratnasamy S,Shenker S,Stoica I.Routing algorithms for DHTs:Some open questions.In:Druschel P,ed.Proc.of the 1st Int'l Workshop on P2P Systems.Berlin:Springer-Verlag,2002.45-52.
    [10]Ogilvie P,Callan J.The effectiveness of query expansion for distributed information retrieval.In:Paques H,Liu L,Grossman D,eds.Proc.of the 10th Int'l Conf.on Information and Knowledge Management.New York:ACM Press,2001.183-190.
    [11]Ankerst M,Breunig M,Kriegel HP,Sander J.OPTICS:Ordering points to identify the clustering structure.In:Delis A,Faloutsos C,Ghandeharizadeh S,eds.Proc.of the 1999 ACM SIGMOD Int'l Conf.on Management of Data.New York:ACM Press,1999.49-60.
    [12]Qiu YG,Frei HP.Concept based query expansion.In:Korfhage R,Rasmussen EM,Willett P,eds.Proc.of the 16th Annual Int'l ACM SIGIR Conf.on Research and Development in Information Retrieval.New York:ACM Press,1993.160-169.
    [3]窦文,王怀民,贾焰,邹鹏.构造基于推荐的Peer-to-Peer环境下的Trust模型.软件学报,2004,15(4):571-583.http://www.jos.org.cn/1000-9825/15/57l.htm
    [8]窦文.信任敏感的P2P拓扑构造及其相关技术研究[博士学位论文].长沙:国防科学技术大学,2003.
    Comments
    Comments
    分享到微博
    Submit
Get Citation

张骞,张霞,文学志,刘积仁,Ting Shan. Peer-to-Peer环境下多粒度Trust模型构造.软件学报,2006,17(1):96-107

Copy
Share
Article Metrics
  • Abstract:4739
  • PDF: 6452
  • HTML: 0
  • Cited by: 0
History
  • Received:March 16,2005
  • Revised:July 11,2005
You are the first2033450Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063